Security News > 2019 > June > SandboxEscaper Debuts ByeBear Windows Patch Bypass

2019-06-07 15:27
SandboxEscaper is back, with a second bypass for the recent CVE-2019-0841 Windows patch.
News URL
https://threatpost.com/sandboxescaper-byebear-windows-bypass/145470/
Related news
- April's Patch Tuesday leaves unlucky Windows Hello users unable to login (source)
- Week in review: Microsoft patches exploited Windows CLFS 0-day, WinRAR MotW bypass flaw fixed (source)
- New Windows Task Scheduler Bugs Let Attackers Bypass UAC and Tamper with Logs (source)
- Microsoft pitches pay-to-patch reboot reduction subscription for Windows Server 2025 (source)
- ThreatLocker Patch Management: A Security-First Approach to Closing Vulnerability Windows (source)
- Microsoft's May Patch Tuesday update fails on some Windows 11 VMs (source)
- Microsoft ships emergency patch to fix Windows 11 startup failures (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-04-09 | CVE-2019-0841 | Link Following vulnerability in Microsoft products An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. | 7.8 |